Home Authors Posts by CISOMAG

CISOMAG

3189 POSTS 0 COMMENTS

How to Simplify Security and Compliance in Cloud

Digital transformation was only a trend a few years ago; however, it has quickly become a reality for many organizations, including government agencies. The...

Innovate Through Uncertainty by Managing Third-party Risk

Like beauty, risk is in the eye of the beholder, and business risk is no exception. While some organizations perceive risk as a potential...

“Privileged access must be scalable at the speed of cloud”

Sectona has been disrupting privilege access management with a global focus. The company helps enterprises mitigate the risk of targeted attacks to privileged accounts...

Why Apple Removed Millions of Apps from App Store?

Identifying and preventing fraudulent apps have become a rising challenge for companies globally. Recently Apple disclosed that, in 2020, it prevented nearly 1 million...

Joe Biden Strengthens U.S. Cyber Defenses by Signing an Executive Order

The U.S. has been under cyberattacks for over a year now. It started with a persistent SolarWinds attack, which was discovered in December 2020...

Snip3: A New Crypter-as-a-Service that Deploys Multiple RATs

Microsoft discovered a spear-phishing campaign in the wild targeting airline, cargo, and travel industries with multiple Remote Access Trojans (RATs). The technology giant stated...

Designing a Secure Remote Future with Windows Remote Desktop Protocol

As COVID-19 drove many employees into remote work, IT departments rushed to get everyone online with access to the data and applications they needed...

FBI and ACSC Warn About Ongoing Avaddon Ransomware Campaign

International law enforcement authorities and the cybersecurity community are joining hands to thwart evolving cyberattacks from various threat actors operating across the globe. Recently,...

Twitter’s Latest Feature “Tip Jar” Draws Privacy Concerns

On May 6, Twitter added a new feature, the Tip Jar. The intent behind this innovation, as Twitter says, “is to support voices of...

34 Ransomware Operators Flood Dark Web with Stolen Data of 2,155...

Cybercriminals often change their hacking tactics to get access to users’ sensitive information. Earlier ransomware operators only focused on encrypting critical systems and demand...

MOST POPULAR

RECENT POSTS